QUESTION 24Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

A. [cache:]B. [site:]C. [inurl:]D. [link:]

Answer: B

QUESTION 25This asymmetry cipher is based on factoring the product of two large prime numbers.What cipher is described above?

A. SHAB. RSAC. MD5D. RC5

Answer: B

QUESTION 26Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?

QUESTION 27During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.What is this type of DNS configuration commonly called?

A. DynDNSB. DNS SchemeC. DNSSECD. Split DNS

Answer: D

QUESTION 28In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

QUESTION 31Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

A. LinuxB. UnixC. OS XD. Windows

Answer: D

QUESTION 32Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?

A. None of these scenarios compromise the privacy of Alice’s data B. Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrew’s attempt to access the stored dataC. Hacker Harry breaks into the cloud server and steals the encrypted dataD. Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before

Answer: D

QUESTION 33A hacker named Jack is trying to compromise a bank’s computer system. He needs to know the operating system of that computer to launch further attacks.What process would help him?